Comparative Study of Security Aspects of Various Symmetric Key Encryption Algorithms
Keywords:
Cryptography, Symmetric Key Encryption, Public Key Cryptosystem, Secret KeyAbstract
Symmetric Key Cryptography also called secret key cryptography is a simpler and faster means of data transfer through an unreliable channel. It requires fewer overheads in terms of speed and energy cost than Public Key cryptosystem. This paper provides an insight into various security aspects of different Symmetric Key Encryption Algorithms.
References
Shipra Jain, Vishal Bhatnagar, “Bit Based Symmetric Encryption Method Using DNA sequenceâ€, pp495-498, 2014 IEEE
M.E. Jones, “Albrecht Kossel, A Biographical Sketchâ€, Yale Journal of Medicine, Vol. 26, Issue No. 1, 1953, pp.80-97.
P. Jhansi Rani, S. Durga Bhavani, “Symmetric Encryption using Logistic Mapâ€, IEEE 2012.
R. L. Devaney, “An Introduction to chaotic dynamical systemsâ€, Addison-Wesley, 1989.
Dus ans Gupta, Planar Geometry(2nd edition).
Mohammad Jabed Morshed .chowdhury, Tapas Pal, “A New Symmetric Key Encryption Algorithm based on 2-d Geometry.
Phillip Rogaway, “Nounce Based Symmetric Encryptionâ€, B.Roy and W. Meier(Eds.): FSE 2004, LNCS 3017, pp.348-359, 2004.
P.Rogaway, M.Bellare,J.Black and T.Krovertz. OCB: block-cipher mode of operation for efficient authenticated encryption. Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS ’01), ACM Press, pp. 196–205, 2001.
P.Rogaway, Authenticated-encryption with associated-data. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), ACM Press, pp. 98–107, 2002.
D.Dolev, C.Dwork and M. Naor. Non-malleable cryptography. SIAM J. Computing, vol. 30, no. 2, pp. 391–437, 2000.
Muna Abdulla Al Shehhi , Joonsang Baek, Chan Yeob Yeun. “The Use of Boolean Functions in Stream Ciphersâ€, IEEE 6th Inter. Conf. Inf. Tech, pp. 29-33, 2011.
C. Carlet. “ Constracting balanced functions with optimum algebraic immunity,†IEEE Inter. Symp. Inf. Theorey, pp. 451-455, 2007.
L. Burnett, W. Millan, E. Dawson and A. Clark, “ Simple methods for generating better Boolean functions with good cryptographic proporties,†Australasian Journal of Combinatorics, vol. 29, pp. 231- 247, 2004.
E. Elsheh, A. B. Hamza and A. Youssef, “ON THE NONLINEARITY PROFILE OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS,†IEEE Canad. Conf. Elec. Comp. Eng., pp. 1767- 1770, 2008.
Downloads
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.